Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T168B1D81BA21C12300F3182B9346D21C9F3A791DC6362E55F6EB1914C27FEF5B8AA7186 |
|
CONTENT
ssdeep
|
96:naCDLD/PKrw/rKSDxKSltKSvKSHKSmAHRQbca6qXvipCt1LaBvQ9Ci9kbfhkDt:naCP7PKrwTKwKctKYKUK0KqUTYaCi2la |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a425d958ccde53c3 |
|
VISUAL
aHash
|
c3030383f300ffff |
|
VISUAL
dHash
|
96164e2627993500 |
|
VISUAL
wHash
|
c3030383e300ffff |
|
VISUAL
colorHash
|
06038000000 |
|
VISUAL
cropResistant
|
96164e2627993500 |
• Ameaça: Phishing
• Alvo: Usuários KuCoin
• Método: Personificação via site falso.
• Exfil: Desconhecido, provavelmente credenciais.
• Indicadores: Hospedagem gratuita, marca KuCoin, formulário de entrada.
• Risco: Alto
The attackers are presenting a fake login form to steal KuCoin login credentials. The form asks for the user's email or phone number.
Pages with identical visual appearance (based on perceptual hash)
Found 2 other scans for this domain